EditorialIvanović Mirjana ,
Radovanović Miloš ,
Kurbalija Vladimir Computer Science and Information Systems, 2022 19(1):i-iii
Details  
Full text (
49 KB)
https://doi.org/10.2298/CSIS220100iI
Guest editorial - applications of intelligent systemsBadica Amelia, Badica Costin,
Kurbalija Vladimir , Bellatreche Ladjel,
Ivanović Mirjana Computer Science and Information Systems, 2022 19(1):v-vi
Details  
Full text (
52 KB)
https://doi.org/10.2298/CSIS220100vB
Teaching computational thinking in primary schools: Worldwide trends and teachers’ attitudesDagienė Valentina, Jevsikova Tatjana, Stupurienė Gabrielė, Juškevičienė Anita
Computer Science and Information Systems, 2022 19(1):1-24
Details  
Cross Ref cited by(9) Full text (
512 KB)
https://doi.org/10.2298/CSIS201215033D
Link quality estimation based on over-sampling and weighted random forestLiu Linlan, Feng Yi, Gao Shengrong, Shu Jian
Computer Science and Information Systems, 2022 19(1):25-45
Details  
Cross Ref cited by(1) Full text (
431 KB)
https://doi.org/10.2298/CSIS201218041L
Comparative analysis of HAR datasets using classification algorithmsNayak Suvra, Panigrahi Chhabi Rani, Pati Bibudhendu, Nanda Sarmistha, Hsieh Meng-Yen
Computer Science and Information Systems, 2022 19(1):47-63
Details  
Cross Ref cited by(4) Full text (
938 KB)
https://doi.org/10.2298/CSIS201221043N
Distributed ledger technology: State-of-the-art and current challengesGorbunova Maria, Masek Pavel, Komarov Mikhail, Ometov Aleksandr
Computer Science and Information Systems, 2022 19(1):65-85
Details  
Cross Ref cited by(6) Full text (
259 KB)
https://doi.org/10.2298/CSIS210215037G
Entropy-based network traffic anomaly classification method resilient to deceptionIbrahim Juma ,
Gajin Slavko Computer Science and Information Systems, 2022 19(1):87-116
Details  
Cross Ref cited by(2) Full text (
1057 KB)
https://doi.org/10.2298/CSIS201229045I
Scaling industrial applications for the Big Data eraŠutić Davor,
Varga Ervin Computer Science and Information Systems, 2022 19(1):117-139
Details  
Full text (
895 KB)
https://doi.org/10.2298/CSIS200531039S
A graph-based feature selection method for learning to rank using spectral clustering for redundancy minimization and biased PageRank for relevance analysisYeh Jen-Yuan, Tsai Cheng-Jung
Computer Science and Information Systems, 2022 19(1):141-164
Details  
Cross Ref cited by(4) Full text (
976 KB)
https://doi.org/10.2298/CSIS201220042Y
Deep RNN-based network traffic classification scheme in edge computing systemKim Kwihoon, Lee Joo-Hyung, Lim Hyun-Kyo, Oh Se Won, Han Youn-Hee
Computer Science and Information Systems, 2022 19(1):165-184
Details  
Cross Ref cited by(8) Full text (
1186 KB)
https://doi.org/10.2298/CSIS200424038K